Tech-abuse continues to be a growing problem for many people. Cyberbullying and online stalking remain a widespread issue among internet users — particularly women — and theyre forced to think about it on a day-to-day basis. One issue women often face is doxing — the collection and publication of personal show more ...
information without the owners consent. And like many other tech-abuse problems, it might even move over from the digital world to the physical one. To help fight this problem, Kaspersky recently partnered with the Singapore Council of Womens Organizations (SCWO) for a collaborative workshop. You can watch the recording of this workshop here, or read the rest of this post to learn how to avoid becoming a victim of doxing. What is doxing and how does it harm women? Basically, the aim of the doxer is to build up a detailed dossier about a user and then post it online or threaten to do it. To do this, a person needs no professional tools. Pretty much anyone can gather personal information with just search engines. Doxers do this for a whole bunch of reasons: to intimidate, humiliate, extort money, punish — you name it. Consequences of such actions can vary a lot too — and can become quite brutal. Some women were even forced to move house. For example, recently a popular Twitch streamer, Wolfabelle, was blackmailed for for sexual favors by an online doxer. The attacker identified where she lived and threatened to publish her address and other private information unless she submits to his sexual demands. The doxer even went so far as to prowl around her home and take pictures of it, which he then sent her. In other cases, doxing may harm not only the person whose information was collected. Sometimes doxers use a persons dossier for catfishing — creation of a fake identity on social networking sites or dating apps. A victim of catfishing believes that theyre communicating with a person whose personal information (primarily — photos) was used to create a profile on a social network. However, in most cases catfishers dont really fake the identity of a real person — they just upload someone elses portrait as an avatar. Doxing is an inclusive malicious activity Doxing doesnt discriminate — you dont have to be a popular streamer, a celebrity or even an activist to get doxed. Often users who end up being victims of tech-enabled abuse lead rather quiet lives, and may even have private accounts on social networking sites. Sometimes victims are folks who were misidentified and wrongly accused of something they didnt do. This happened to Lucy from Canberra, who was misidentified as a person in a video containing racist statements. Within hours, Lucys personal data was spread online. After that, Lucy and her family received numerous death threats online and didnt feel safe for weeks. Check it for yourself You can test how easy it is to dox a person by trying to build a portfolio about yourself or your close ones (with their consent, of course) — and see how much you can find. To do this, google the person and explore what you can find using their nickname and/or actual name on social media and other websites. You may be surprised by how much you discover. What should I do to protect myself? The best way to avoid doxing is to prepare for it. Weve compiled some simple pieces of advice that will help you to do that: Make your profile private, and check who follows you This way at the very least youll be able to control who sees your posts. Just making your profile private isnt enough though. Consider who follows you — do you know all of them? Do you trust them? Remember, any one of them can take a screenshot of what youve posted, and that screenshot will no longer be limited to your private space online. Think for 30 seconds before you post or share Nothing on the internet is temporary — a post you made on Instagram and later deleted could have been saved on some website that mirrors the social network. Edits to posts can also be tracked. And, of course, the audience of your post can save it too. So, before posting anything online or agreeing to share your information with any online platform, think twice — or even thrice if we are talking about especially sensitive data (more about that later). And remember, something you might deem useless (like which websites you visited) may be exploited by doxers and used to profile you. Reconsider your understanding of personal data Once youve been doxed, the harm is hardly reversible (but well talk about the ways you can minimize the damage later). The first thing any user should do is reconsider their attitude toward personal data — and what is understood by the term. Personal data is any data that can identify you in a direct or indirect way. For instance, your photo and surname identify you directly, but your email address, phone number, and even the location of your workplace can also identify you. Some personal data might be more sensitive than others. For example, exposure of religious beliefs, ethnicity, or health data can cause serious problems under certain circumstances. Thats why the decision on publishing this data anywhere requires extra thought. Of course, there are laws in place that are meant to protect your personal data. In the EU its a pretty harsh law called the GDPR. GDPR forces organizations to take better care of personal data. Yet this doesnt stop individuals from simply gathering personal information about somebody theyve published themselves, consciously or not. Do not share your location Information about places you often visit or where you live might be the most sensitive because it may be easily exploited by an offline stalker. So its crucial to restrict access to this data as much as possible. In this spirit, rethinking your geotagging policy would be a good idea too. But social media is not the only source of geolocation data. Sometimes our location can be revealed by the apps we use. One of our researchers used a jogging app that allows to track running exercises. Soon it turned out that other users of this app could see the exact running rout? of our researcher. This information, along with photo and username was shared by the app online. The conclusion is simple: check all your apps and make sure your location is not shared unnecessarily. Apple devices actually help with this and will notify you about your geolocation settings when you start using a new app. But in case of already installed applications, or if you are using other platforms, youll have to check settings manually. Ive been doxed. What to do? If you or your close ones have been doxed, there are still some things you can do to minimize the damage: Report all the posts that are spreading your personal information.. Social media platforms usually deem the spread of such information as a violation, so chances are youll be able to take the posts down. Also asking your friends to report them might help speed up the process. Gather the evidence. Save all threatening emails, posts by other users, phone calls, and any other related interactions. Document everything in detail — this will help when you report abuse not only to social media, but also to the police. Contact law enforcement. Your local police station may not know what doxing is, but hopefully theyll understand the danger from online abuse and threats. Share with them all you know and seek action. Get support. Get in touch with your friends and family to get their support. Also, dont hesitate to reach out to your local NGO that helps victims of online abuse; for example, in Singapore, that would be SCWO.
About three-quarters of Java and .NET applications have vulnerabilities from the OWASP Top 10 list, while only 55% of JavaScript codebases have such flaws, according to testing data.
The Series C round was led by Empyrean Technology Solutions, a space technology platform backed by funds affiliated with Madison Dearborn Partners. The round included additional investment from Method Capital and OCA Ventures.
Over one in four (26%) British SMBs have been targeted by ransomware over the past year, with half (47%) of those compromised paying their extorters, according to new data from Avast.
From gaining initial access to compromising the Active Directory domain of an unnamed target within 24 hours, a new IcedID malware attack was seen to be even more promising for hackers. The attackers used ISO and LNK files instead of traditional phishing-based attacks and delivered macro-based documents. They executed the same Cobalt Strike Beacon in all compromised workstations.
European cops arrested 15 suspected scammers and shut down a multi-country network of call centers selling fake cryptocurrency that law enforcement said stole upwards of hundreds of millions of dollars from victims.
About 77% of IT decision-makers across the United States and Canada believe their companies are likely to face a data breach within the next three years according to survey results released by Adastra.
The defacement text is ambiguous as to whether the hackers exfiltrated data from ODIN’s systems or if, as it claims, “all data and backups have been shredded,” suggesting that there may have been an attempt to erase the company’s stores of data.
A new analysis of Raspberry Robin by cybersecurity firm SEKOIA found that threat actors can repurpose their command-and-control (C2) infrastructure to infect more servers. Hackers used compromised QNAP NAS devices resolved by domain names as its first C2 level, as a validator and forwarder. The initially compromised servers act as forward proxies to the next as-yet-unknown tier.
France's data protection authority (CNIL) has fined TikTok UK and TikTok Ireland €5,000,000 (~$5.42 million) for making it difficult for users of the platform to refuse cookies and for not sufficiently informing them about their purpose.
Unidentified cybercriminals were observed working through a new malicious backdoor that borrows its features from the U.S. CIA's Hive multi-platform malware suite. Named Xdr33, the new variant of the HIVE kit collects sensitive information and provides a foothold for subsequent intrusions.
Thousands of Norton LifeLock customers had their accounts compromised in recent weeks, potentially allowing criminal hackers access to customer password managers, the company revealed in a recent data breach notice.
A new Zapata Computing report reveals a deepening commitment from enterprises that points to a maturing industry with widespread, global interest and increased urgency regarding post-quantum cybersecurity threats.
Gootkit loader aka Gootloader resurfaced in a new spate of attacks that targeted the Australian healthcare industry. The malware operators leveraged SEO poisoning attacks for initial access. To push the infection to the next phase, the loader abused legitimate applications like VLC Media Player. Security teams in show more ...
the healthcare sector of Australia must deploy/configure their security solutions to mitigate such threats.
Various individuals have been observed, for instance, discussing how to use stolen payment cards to pay for upgraded users on OpenAI (thus circumventing the limitations of free accounts).
Sigstore community today announced the first stable release of sigstore-python, improving software supply chain security and paving the way for other client implementations of Sigstore that are in earlier stages.
The five-round championship, which culminates in a live 24-hour finale, is ending on a sour note after server problems saw Verstappen - who was leading the race by over a minute - thrown out of the game and disconnected.
The US Department of Defense (DoD) is getting ready to launch the third installment of its ‘Hack the Pentagon’ bug bounty program, which will focus on the Facility Related Controls System (FRCS) network.
The hacktivist group known as GhostSec claims to have conducted the first-ever ransomware attack against a remote terminal unit (RTU), a type of ICS device used for communications between field devices and SCADA systems.
The infection chain "uses about a hundred of fake cracked software catalog websites that redirect to several links before downloading the payload hosted on file share platforms, such as GitHub," cybersecurity firm SEKOIA said.
The data of the Israeli company and of another Swedish forensics firm, MSAB, have been leaked online by the Enlace Hacktivista collective, with the support of a whistleblower, and later through the DDoSecrets platform.
Full encryption methods such as S/MIME and PGP/GPG enable complete confidentiality where only the recipient can decrypt the email message due to the possibility of verifying the sender’s identity.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released several Industrial Control Systems (ICS) advisories warning of critical security flaws affecting products from Sewio, InHand Networks, Sauter Controls, and Siemens.
Victims of a massive investment fraud scheme are set to receive restitution. Around 800 individuals residing in over 40 countries worldwide will benefit from the federal district court order issued in San Diego at the end of last week.
Bitdefender security analysts stumbled across a malware threat campaign dropping EyeSpy spyware. It is originally considered to be a part of a monitoring application called SecondEye. The campaign appears to have begun in May last year from Iran, with infections detected across Germany and the U.S. Experts recommend genuine VPN solutions downloaded via official websites.
Shields Health Care Group, a prominent Massachusetts-based medical imaging services provider, is facing proposed class action lawsuits in federal and state court stemming from a 2022 breach that affected 2 million individuals.
MetaMask, the cryptocurrency wallet provider, disclosed a new scam baiting its users into sending funds to scammers’ wallet addresses. The address poisoning technique used by scammers relies on similarity to the original recipients’ addresses. Creating an address that closely matches a target address takes less than a minute, revealed experts.
With SecZetta, SailPoint will be able to expand its capabilities to help companies gain better visibility into all types of identities, across both employee and non-employee identities all from a single, market-leading identity security platform.
BianLian (not to be confused with the same-name Android banking trojan) is a Go-based ransomware hitting Windows systems. It uses the symmetric AES-256 algorithm with the CBC cipher mode to encrypt over 1013 file extensions on all accessible drives.
Sophos reported that the Cuba ransomware group used malicious hardware devices certified by Microsoft’s Windows Hardware Developer Program in an attack that abuses OWASSRF vulnerability.
LockBitSupp’s focus on professionalizing the group is part of the reason why Lockbit has found such success in the cybercriminal world – the group accounted for 44 percent of the total ransomware attacks launched last year.
Unidentified threat actors have deployed a new backdoor that borrows its features from the U.S. Central Intelligence Agency (CIA)'s Hive multi-platform malware suite, the source code of which was released by WikiLeaks in November 2017. "This is the first time we caught a variant of the CIA Hive attack kit in the wild, and we named it xdr33 based on its embedded Bot-side certificate CN=xdr33,"
A "large and resilient infrastructure" comprising over 250 domains is being used to distribute information-stealing malware such as Raccoon and Vidar since early 2020. The infection chain "uses about a hundred of fake cracked software catalogue websites that redirect to several links before downloading the payload hosted on file share platforms, such as GitHub," cybersecurity firm SEKOIA said in
When considering authentication providers, many organizations consider the ease of configuration, ubiquity of usage, and technical stability. Organizations cannot always be judged on those metrics alone. There is an increasing need to evaluate company ownership, policies and the stability, or instability, that it brings. How Leadership Change Affects Stability In recent months, a salient example
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released several Industrial Control Systems (ICS) advisories warning of critical security flaws affecting products from Sewio, InHand Networks, Sauter Controls, and Siemens. The most severe of the flaws relate to Sewio's RTLS Studio, which could be exploited by an attacker to "obtain unauthorized access to the server, alter
A security breach may have cost current Formula 1 World Champion Max Verstappen an esports championship victory yesterday, and he's not happy. Read more in my article on the Hot for Security blog.